Version-4 (Jan-Feb 2016)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Context-Centred Mobile Applications Development For Effective Adoption Of Mobile Technology |
Country | : | India |
Authors | : | Vincent O. Omwenga |
Abstract: Recent approaches in mobile computing consider context to be central to the design and implementation of mobile applications. Context considerations enables the mobile application to respond to the needs and purpose it is intended for. Qualitative and quantitative research techniques have been applied to investigate and come up with components that are critical in the development of context-centred mobile applications.It is however critical to understand how toseparatecore application logic from adaptive functionality in order toachieve a context-centred mobile applications.
[1]. Benou,P., &Bitos, V. (2008), Developing Mobile Commerce Applications. Journal of Electronic commerce in Organizations, Volume 6, Issue 1.
[2]. Brown, J., Bovey, D., & Chen, X. (1997). Context-Centeredapplications: From the laboratory to the marketplace. IEEE Personal Communications, 4(5), 58-64.
[3]. Buthpitiya, S., Cheng,H., T., Sun,F., T., Griss,M. &Dey,A.,K.(2011). Hermes: a Context-Centeredapplication development framework for the Mobile Environment. Carnegie Mellon University.
[4]. Dehlinger, J., &Dixon,J. (2011). Mobile Application Software Engineering: Challenges and Research Directions. Department of Computer and Information Sciences -Towson University
[5]. Dey, A., &Abowd, G. (1999). Towards a better understanding of context and context-awareness. Technical Report 99-22. Georgia Institute of Technology.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Group Key Management using Ciphertext in MANETs |
Country | : | India |
Authors | : | P Swetha || Dr. P. Premchand || Dr. P. Naveen Kumar |
Abstract: The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted communication from the cluster/group nodes to the sender and unavailability of a trusted public/private key generation center. This paper proposes a technique that uses a combination of broadcast encryption technique and Cluster/Group key agreement to overcome the obstacles. Among the proposed techniques each member maintains one public/secret key pair, seeing that the remote sender broadcasts to the subgroup. Though the non-intended member conspire they will not extractinformation that boosts security of the message. The Cluster /Group size is independent of computation and communication overhead that decreases the delay. The proposed technique provides competent approach to add or delete members of a cluster and a flexible rekeying strategy. In case of conspiracy it provides security to the broadcasted data. Simulation results are given using NS2.
Keywords: MANET, network lifetime, throughput,Network delay.
[1]. Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Fellow, IEEE, and JesúsA. Manjón "Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm"- IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013.
[2]. M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," Adv. Cryptol., vol. 950, EUROCRYPT'94, LNCS, pp. 275–286, 1995.
[3]. M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The versakey framework: Versatile group key management," IEEE J. Sel. Areas Commun., vol. 17, no. 9, pp. 1614–1631, Sep. 1999.
[4]. M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769–780, Aug. 2000.
[5]. A. Sherman and D. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444–458, May 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Energy Efficient Query Optimization in WSN usingThreeLevel Modelling |
Country | : | India |
Authors | : | C.Komalavalli || VijayBhushanAggarwal |
Abstract: With advancement in microprocessor technology, wireless sensor networks is playing vital role in
different types of applications such as health care monitoring, fire detection etc. In these applications, large
amount of data generated by the sensors are communicated to the base station, which will provide final result
for the query. Since the sensor nodes are energy constraint devices, energy efficient query methods and storage
of the data is required. Clustering is playing an important role in enhancement of the energy level of the sensor
and scalability of the network. Since communication depletes the energy level of the sensor, further selection of
cluster head is important for reducing the communication cost. In this paper, we are introducing the model
along with algorithm for the cluster head selection and efficient query processing in WSN.
Keywords:WSN, Clustering, Base Station, Cluster Head, Tiny DB
1]. Ousmane Diallo, Joel J. P. C. Rodrigues, Senior Member, IEEE, Mbaye Sene, and Jaime Lloret, Senior Member –"Distributed
Database Management Techniques for Wireless Sensor Networks",IEEE Transcations on Parallel and Distributed Systems,IEEE
2013
[2]. MeenakshiDiwakar, Sushil Kumar – " An Energy Efficient Level Based Clustering Routing Protocol For Wireless Sensor
Networks", International Journal Of Advanced Sensor Network Systems, Vol 2, No 2, April 2012
[3]. Devesh Pratap Singh, R. H. Goudar , Bhasker Pant , Sreenivasa Rao-" Cluster head selection by randomness with data recovery in
WSN" , Aug 2014, Springer
[4]. C. Komalavalli, Chetna Laroiya Energy Efficient Protocol in Wireless Sensor Network: Reactive On-Demand Routing, IITM
Journal for Management & IT, Vol 2 Issue 1,2010
[5]. SrieVidhya Janani. E, Ganeshkumar.P, Vasantha Suganthi.G, Sultan.M, Kaleeswaran. D," A Survey on Algorithms for Cluster Head
Selection in WSN", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No
5, May 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Efficient And Secure Cryptography Techniques Usingunimodular Matrix |
Country | : | India |
Authors | : | ApurvaK.Vangujar || Kajal Agrawal |
Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is
one of the best techniques for the secure data transmission. Confidentiality of data, access control and nonrepudiation
are the main goals of cryptography. The existing system is having limitations related to decrypts of
Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption.
Therefore, access control, non-repudiation and confidentiality of data is maintained.
Keywords: cryptography, decryption, encryption, unimodular matrix, Armstrong numbers
1]. Ajmal, K., et al. Security using Colors, Figures and Images. in International Conference on Emerging Technology Trends on
Advanced Engineering Research (ICETT'12) Proceedings published by International Journal of Computer Applications (IJCA).
2012.
[2]. Belose, S., M. Malekar, and G. Dharmawat, Data Security Using Armstrong Numbers. International Journal of Emerging
Technology and Advanced Engineering. ISSN, 2012: p. 2250-2459.
[3]. Stallings, W., Cryptography and Network Security, 4/E. 2006: Pearson Education India.
[4]. Anoop, M., Public key Cryptography-applications Algorithms and Mathematical Explanations. Tata Elxsi Ltd, India, 2007.
[5]. Rescorla, E., Diffie-Hellman key agreement method. 1999.
[6]. Weisstein, E.W., Unimodular matrix. 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review: Hadoop Storage and Clustering Algorithms |
Country | : | India |
Authors | : | Latika Kakkar || Gaurav Mehta |
Abstract: In the last few years there has been voluminous increase in the storing and processing of data,
which require convincing speed and also requirement of storage space. Big data is a defined as large, diverse
and complex data sets which has issues of storage, analysis and visualization for processing results. Four
characteristics of Big data which are–Volume, Value, Variety and Velocity makes it difficult for traditional
systems to process the big data. Apache Hadoop is an auspicious software framework that develops applications
that process huge amounts of data in parallel with large clusters of commodity hardware in a fault-tolerant and
veracious manner. Various performance metrics such as reliability, fault tolerance, accuracy, confidentiality
and security are improved as with the use of Hadoop.
[1] Mayer-Schönberger V, Cukier K, Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin
Harcourt, 2013.
[2] Chen M, Mao S, Liu Y, Big data: A survey: Mobile Networks and Applications, 19(2), 2014 Apr 1, 171-209.
[3] Labrinidis A, Jagadish HV, Challenges and opportunities with big data, Proceedings of the VLDB Endowment, 5(12), 2012 Aug
1,2032-3.
[4] Chaudhuri S, Dayal U, Narasayya V, An overview of business intelligence technology, Communications of the ACM,54(8), 2011
Aug 1,88-98.
[5] Agrawal D, Bernstein P, Bertino E, Davidson S, Dayal U, Franklin M, Gehrke J, Haas L, Halevy A, Han J, Jagadish HV,
Challenges and Opportunities with big data, 2011-1.
[6] Apache Hadoop, http://hadoop.apache.org
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on E-Learning in Higher Education |
Country | : | India |
Authors | : | Mohammad Bani Younes || Samer Al-Zoubi |
Abstract: E-learning is basically the computer and network-enabled transfer of skills and knowledge to
learners. It is considered one of the most successful educational media, especially after realizing that learning is
no longer becomes a stage in human life but it has become a continuous and lasting process and it is essential
for the individual as well as for the entire community. However, e-learning offers the possibility of continuous
learning and its characteristics that makes it a significant element in the learning process. Still, the main goal of
this article is to increase the awareness of the community members towards the importance of e-learning
currently, and that the integration of this method with the traditional method in learning usually provides
valuable and encouraging results.
[1] Dr. V. Sarpi, The use of ict in higher education, Shramjivi College of Education, Omerga Dist.Osmanabad, An International Peer-
Reviewed Open Access Journal, 1(3), 2015, 778-781.
[2] A. S. Safi, E.T. Liga and C. Sanga, New technologies for teaching and learning: challenges for higher learning institutions in
developing countries, Sokoine University of Agriculture, Tanzania, International Journal of Education and Development using
Information and Communication Technology, 3(2), 2007, 253-275.
[3] D. G. Oblinger and B. L. Hawkins, The myth about e-learning. educause review, 2005.
[4] J. K. Njenga, L. H. Fourie, The myths about e-learning in higher education, British Journal of Educational Technology, 41(2), 2010,
199-212.
[5] G. Singh, J. O'Donoghue and H. Worton, A study into the effects of elearning on higher education, Journal of University Teaching
and Learning Practice, 2(1), 2005, 13-24.
[6] V. Medarova, V. Bures and T. Otcenaskova, A review of obstacles to successful e-learning deployment in SMEs, IBIMA
Publishing, Journal of Innovation Management in Small & Medium Enterprises, vol. 2012, Article ID 715039, DOI:
10.5171/2012.715039, 2012, 1-9.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique |
Country | : | India |
Authors | : | Rituparna Halder || Susmit Sengupta || Sudipta Ghosh || Debashish Kundu |
Abstract: Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Therefore from time to time researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. In this paper we have proposed a new technique of image steganography i.e. Hash-LSB with RSA algorithm for providing more security to data as well as our data hiding method.
......................,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Utilization of Weight Allocation in Tf-Idf Environment for Noise Detection Enhancement |
Country | : | Kenya |
Authors | : | Evelyne Chanya Shuma || Prof. Waweru Mwangi || Dr. Michael Kimwele |
Abstract: Social media data mining has gained significance in the recent past. This owes to the importance of establishing hidden patterns in the social media data that can be used in digital marketing strategies. It helps the marketers to segment customers according to their demographics and behavioral characteristics such that it becomes easier to target these customer segments with advertisement messages suitable for their cluster. As such, it becomes paramount to discover and eliminate any data that may not influence customer buying trends. This constitutes noise removal. Weight allocation then becomes crucial in identifying keywords from social media data that can help in the clustering process.
[1]. Curran, J, & Lennon, R. (2011). Participating in the Conversation: Exploring adoption of Online Social Media Networks. Academy
of Marketing Studies Journal 15(1), 21-38.
[2]. Reza Zafarani and Huan Liu, Arizona State University (2014). Behavior Analysis in Social Media
[3]. Anderson, T. H.C. (December 6, 2009). College Students say Facebook is the only Social Networking site that really matters.
[4]. Ito, M., Horst, H., Bittanti, M., Boyd, D., Herr-Stephenson, B., Lange, G., Pascoe, D.J., & Robinson, L. (2008). Living and learning
with new media; Summary of the findings from the digital youth project. Chicago.
[5]. Protalinski, E. (2012). Facebook has over 845 million users.
[6]. Perreau F. (2015). The Consumer FactorConsumer Insights, Market Research, Consumer Behavior & Neuromarketing.
[7]. Lennon R., Rentfro W. & Curran J.(2015). Exploring relationships between demographic variables and social networking use.
Journal of Management and Marketing Research.
[8]. John H. Heinrichs1, Jeen-Su Lim And Kee-Sook Lim (2011), Influence of social networking site and user access method on social
media evaluation
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of Security Based Reserved Agreement Blocker for Smartphone |
Country | : | India |
Authors | : | Ms. Shirin Ayisha Maryam. M || S. Arogya Swarna |
Abstract: Smart phones are very effective tools for increasing the productivity of business users. With their increasing computational power and storage capacity, smartphones allow end users to perform several tasks and be always updated while on the move. In Existing system, the location-based policy systems (LPS) are not accurate enough to differentiate between nearby locations without extra hardware or location devices. In most cases, such systems assume the context as given without providing or evaluating context detection methods of mobile devices. In order to overcome this issue, context-based access control (CBAC) mechanismhave been proposed. By means of CBAC, many privileges can be dynamically granted or revoked to applications based on the specific context of the user.
[1]. MOSES: Supporting and Enforcing Security Profiles on Smartphones(2014)Yury Zhauniarovich, Giovanni Russello Mauro Conti, Member, IEEE,Bruno Crisp and Earlence Fernandes. ieee transactions on dependable and secure computing, vol. 11, no. 3, may-june 2014
[2]. M. Oleaga, 2013, "OS vs. Android Market Share 2013: Google Mobile Platform Dominating Apple Worldwide in March Figures", http://www. latinospost.com/articles/15039/20130322/ios-vs-android-market-share-2013-google- mobile-platform-dominating.htm, accessed 25 March 2013.
[3]. O.Hou, 2012, "A Look at Google Bouncer", http://blog. trendmicro.com/trendlabs-security-intelligence/a-look-at-google-bouncer/, accessed 14 April 2013
[4]. FY. Rashid, 2012, "Researchers upload dangerous app to Google Play store", http://www.scmagazine.com.au/News/310192,blackhat-researchers- upload-dangerous-app-to-google-play-store.aspx, accessed 14 April 2013
[5]. Y. Zhou, X. Zhang, X. Jiang & V. Freeh, "Taming information-stealing smartphone applications (on Android)", TRUST 2011, pp. 93-107.
[6]. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev & C. Glezer, "Google Android: A Comprehensive Security Assessment", IEEE Security & Privacy Magazine, Vol. 8, no. 2, 2012, pp. 35-44.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Data Sharing Using Cryptography in Cloud Environment |
Country | : | India |
Authors | : | Anjali Patel || Nimisha Patel || Dr. Hiren Patel |
Abstract: Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand storage and computing services for users. In cloud based storage concept, data owner does not have full control over own data because data controlled by the third party called cloud service providers (CSP). Data security is challenging problem when data owner shares own data to another known as data sharer on cloud. Many researchers have addressed this issue by cryptography with different encryption schemes that provides secure data sharing on cloud. Here, we propose system model for secure data sharing on cloud with intension to provides data confidentiality, access control of share data, removes the burden of key management and file encryption/decryption by users, support dynamically changes of users membership and owner should not be always online when the user wants to access the data.
Keywords: Cloud Computing, Data security, Cloud Service Providers (CSP), Secure Sharing, Cryptography, Access control
[1] Mell P. and Grane T. (September 2011), "The NIST Definition of Cloud Computing," National Institute ofStandards and Technology (NIST) [Online], Available:http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[2] Mazhar Ali, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li and Albert Y. Zomaya,SeDaSC: Secure Data Sharing in Clouds,SYSTEMS JOURNAL PP,no.99,2015,1-10.
[3] Hussain Aljafera, Zaki Malika, Mohammed Alodibb and Abdelmounaam Rezguic,A brief overview and an experimental evaluation of data confidentiality measures on the cloud,JOURNAL OF INNOVATION IN DIGITAL ECOSYSTEMS 1, no.1-2,2014,1–11.
[4] Minu George, Dr. C.Suresh Gnanadhas and Saranya.K,A Survey on Attribute Based Encryption Scheme in Cloud Computing , International Journal of Advanced Research in Computer and Communication Engineering 2, no. 11,2013,4408-4412.
[5] Md Mozammil Alam, Sourav Hati, Debashis De and Samiran Chattopadhyay,Secure Sharing of Mobile Device Data using Public Cloud,Confluence The Next Generation Information Technology Summit,2014,149 – 154.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Implementation of Secured E-Commerce System |
Country | : | India |
Authors | : | Buthainah Fahran Abed || Rafah Shihab Al-Hamadani || Saja Ghassan Mohmmed |
Abstract: E-commerce involves the process of buying, selling, and exchanging of products, services, and information via computer networks, primarily the Internet. The objective of this paper is to identify obstacles that facing the implementation of e-commerce system and providing security solutions to protect sensitive information. In the practical part the paper presents the design and implementation of secure site that allow the customers to search and buy products at anytime and anyplace through the Internet. All data are archived and stored in the proposed system, so that the administrator can easily search and retrieve information at any time and can make changes to them.
Keywords: Security, Safety, Encryption, E-commerce, Site, Attacker
[1] ''Introduction to Computers'' , http://www.b-u.ac.in/sde_book/bcom_ca.pdf
[2] Y. A. Nanehkaran ,''An Introduction To Electronic Commerce'' , INTERNATIONAL JOURNA L OF SCIENTIFIC & TECHNOLOGY RESEARC H VOLUME 2ISSUE 4 , APRIL 2013. ISSN 2277-8616
[3] R. Lerdorf, K. Tatroe, B. Kaehms, and R. McGredy, "Programming PHP", Published by O'Reilly & Associates, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. http://www.tutorialspoint.com/css/css_tutorial.pdf
[5] M. Niranjanamurthy, D. Chahar, ''The study of E-Commerce Security Issues and Solutions'' , International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7,July 2013, ISSN (Online) : 2278-1021
[6] N. Shafiyah, R. Alsaqour, H. Shaker, O. Alsaqour and M. Uddin, ''Review on Electronic Commerce'', Middle-East Journal of Scientific Research 18 (9): 1357-1365, 2013 ISSN 1990-9233, © IDOSI Publications, 2013, DOI: 10.5829/idosi.mejsr. 2013.18.9.12421
[7] D. Pandey, V. Agarwal, " E-commerce Transactions: An Empirical Study", IJARCSSE All Rights Reserved Page | 669 Volume 4, Issue 3,March 2014, ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering, Research Paper Available online at: www.ijarcsse.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Improved Genetic Algorithm Based On Adaptive Differential Evolution |
Country | : | China |
Authors | : | Feng Jiang || Yi Shen || Panpan Ge || Chen Zhang || Mingxin Yuan |
Abstract: In order to solve the premature convergence and improve the optimization ability of simple genetic algorithm (SGA) in the complex function optimization, an improved differential evolution based-genetic algorithm (DGA) is proposed in this paper. On the basis of the selection and crossover operation of SGA, the adaptive differential evolution operator is used as the main optimization method to realize the mutation operation. Furthermore, the optimal reservation and worst elimination strategies are added in the SGA. All of these improvements can significantly improve the optimization performance of SGA. Compared with the SGA, the simulation results of function optimization show that the proposed DGA is characterized by strong global optimization ability, quick convergence speed and good stability, which shows the validity of the improvements to simple genetic algorithm.
Keywords: Self-adaption, Differential evolution, Genetic Algorithm, Function optimization
[1]. L.B. Booker, D.E. Goldberg, J.H. Holland, Classifier systems and genetic algorithms, Artificial Intelligence, 89,1989,235–282.
[2]. G. Gong, G.S. Hao, F. Yang, An improved algorithm for the suppression of premature convergence of genetic algorithms, Computer and Digital Engineering, 5, 2009, 6-9, 16.
[3]. L. Ling, Y.J. Hu, Q.Q. Wang, J.J. Zhang. Optimization of hole group machining path based on improved genetic algorithm, Journal of Huazhong University of Science and Technology (NATURAL SCIENCE EDITION), 8, 2009, 88-91.
[4]. R. Storn, K. Price, Differential evolution-a simple and efficient heuristic for global optimization over continuous space, Journal of Global Optimization, 4, 1997, 341-359.
[5]. Y.L. Zhou, Y.H. Zhu, Discrete differential evolution with fitness uniform selection scheme, Journal of Chinese Computer Systems, 1, 2012, 151-154.
[6]. M.X. Yuan, H.F. Du, S.A. Wang, J. Zhuan, Chaos small-world optimal algorithm based on population entropy,Journal of Xi'an Jiaotong University,9,2008,1137-1141.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Test Cases Prioritization For Event –Driven Software By Using Genetic Algorithm |
Country | : | INDIA |
Authors | : | D. Vivekananda Reddy || Dr. A. Rama Mohan Reddy |
Abstract: Event-Driven software (EDS) is being used very frequently in this interconnected world of ubiquitous computing. Two mostly used classes are the GUI stand alone applications and Web applications. Testing of these two applications take significant amount of time because testing is composed of large number of test cases. Due to their user –centric nature, GUI and Web systems routinely undergo changes as part of their maintenance process. New versions of the applications are often created as a result of bug fixes or requirements modification. In such situations, a large number of test cases may be available from testing previous versions of the application which are often reused to test the new version of application. Moreover an event is to be tested in each and every state thus requiring large number of test cases. Substantially there is lack of single generic model and a ranking algorithm that efficiently orders the tests for execution which works for both applications. Now the motivation is to come up with a generic testing model for both applications, a shared prioritization function based on the abstract model that uses a genetic algorithm, and shared prioritization criteria that effectively reduces the testing time and cost. Ultimate goal is to generalize the model and use it to develop a unified theory how all EDS should be tested.
Keywords: Event-Driven software, Test cases, prioritization criteria, Genetic algorithm.
[1]. Renee CBryce, SreedeviSampath, and Atif M. Memon, "Developing a Single Model and Test prioritization Strategies for Event-Driven Software", IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, pp.48-64, Jan 2011.
[2]. Steffen Herbold, Jens Grabowski, Stephan Waack, "A Model for Usage-based Testing of Event-driven Software", 5th International Conference on Secure Software Integration & reliability, pp.172-178, Aug- 2011.
[3]. Mark Utting, Alexander Pretschner and Bruno Legeard, "A Taxonomy Of Model Based Testing", Working paper by Waikato,pp.1-17, April 2006.
[4]. DING Xiao-Ling, DING Chun, Hou Yong hong, "An Approach To Event-Driven Software Testing", Vol .8.No-4, pp.265-268, Dec-2002.
[5]. Renee C.Bryce, AtifM.Memon, "Test suite Prioritization By Interaction Coverage", Workshop on Domain specific Software Test automation in Conjunction with the 6th ESEC/FSE Joint Meeting, pp.1-7, Sep-2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Content Analysis of the Research Papers on Foreign Language Education |
Country | : | INDIA |
Authors | : | Debabrata Kar || Bikram Keshari Rout |
Abstract: The purpose of this study was to determine the trends of recent research papers in foreign language
teaching in Turkish context and to give ideas to researchers and policy makers for future studies. Content
Analysis method was used in this study. The focus of the study was 189 research papers published between
2009-2013 years in journals indexed in SSCI (94) and the ULAKBIM (95) database in Turkey. Research
Papers Classification Form was used as data collection instrument. The papers were scanned in terms of year
of the journal, authors, language of the paper, journal index, topic of the paper, research design, data
collection tools, sample, sample size and data analysis method. The results revealed that the most frequently
studied topics on foreign language.......
Keywords: Content analysis, Analysis of research papers, Analysis of papers on language teaching, foreign language teaching, paper classification
[1]. Çiltaş, A., Güler, G., & Sözbilir, M. (2012). Mathematics education research in Turkey: A content analysis study. Educational
Sciences: Theory & Practice, 12(1)574-578.
[2]. Göktaş, Y., Hasançebi, F., Varışoğlu, B., Akçay, A., Bayrak, N. , Baran, M.,& Sözbilir, M. (2012). Trends in educational research
in Turkey: A content analysis. Educational Sciences: Theory & Practice,12(1)455-459.
[3]. Güven, B., Karatau, İ., Akkan, Y.,& Çakıroğlu, U. (2011). Trends in Turkish mathematics education research: From 1998 to 2007.
Hacettepe University Journal of Education, 40:57-68.
[4]. Kırkgöz, Y. (2005). English language teaching in Turkey: Challenges for the 21st century. In G. Braine (Ed.), Teaching English to
the world: History, curriculum, and practice (pp. 159-175). Mahwah: Lawrence Erlbaum Associates.
[5]. Sarıçoban, G. & Sarıçoban, A. (2012). Atatürk and the history of foreign language education..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancement of the Voltage Profile in the Distribution Network using STATCOM Static Synchronous Compensator |
Country | : | INDIA |
Authors | : | Satyabrata Sahoo || Debasis Nanda |
Abstract: STATCOM is one of FACTS devices that used as regulator for transmission and distribution systems
which works for reactive power compensation. STATCOM utilisation in distribution system mostly for
enhancing the profile of voltage, where used for adjusting the disturbance voltage by injecting into the system a
controllable voltage. This paper present a Fuzzy controller based on STATCOM to enhance the voltage profile
in distribution network. The controller of STATCOM has simulated for different types of abnormal load
conditions of balance and unbalance load. The results of simulation show ability of proposed design to enhance
the load voltage which was 96% of the nominal value..
[1] E. Acha, C. Fuerte, H. Ambriz and C. Angeles-Camacho, "FACTS Modeling and Simulation in Power Networks", John Wiley &
Sons Ltd, pp 21-23, 2004.
[2] P. Kumar, "Enhancement of power quality by an application FACTS devices," International Journal of PowerElectronics and Drive
Systems (IJPEDS), vol.6, no. 1, pp. 10-17, 2015.
[3] A. Oukennou, et al., "Coordinated Placement and Setting of FACTS in Electrical Networks based on eqKalai-smorodinsky
Bargaining Solution and Voltage Deviation Index," International Journal of Electricalandomputer Engineering (IJECE), vol. 6, no.
6, pp 4079-4088, 2018.
[4] R. Mathur and R. Varma, "Thyristor-based FACTS Controllers for Electrical Transmission Systems," Wiley-IEEEPress Power
engineering, Piscataway, NJ, Mar, pp 34-36, 2002.
[5] Hingorani and L. Gyugyi, "Understanding FACTS, Concepts and technology of flexible AC transmission systems," IEEE Press, pp
172-174, 2000..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enviornmental Effects of Metal Mining Biotechnological Asspects of Water Contamination and Remediation |
Country | : | INDIA |
Authors | : | Anjali Sahu || Jayanta Pal |
Abstract: The role of chemolithotrophs, for example, Acid thiobacillusferroxidase in the generation of acid rock
drainage from abandoned sulfidic mines and tailing dumps is examined. Case studies as for an Indian copper
mine and mill tailings are shown. Acid production potentials of mined sulfide ores and tailings within the sight
of A. ferroxidase are set up and it is indicated that calcareous gangue effectively neutralized bacterial acid
generation. The role of sulfate reducing bacteria in the remediation of acid rock drainage is brought out
Keywords: Acid thiobacillusferroxidase, Bioremediation, Mine wastes, Acid generation, Acid production potential, Sulfate reducing bacteria..
[1]. Aube, B.C., St-Arnaud, L.C., Payant, S.C., Yanful, E.K., 1995. Laboratory evaluation of the effectiveness of water covers for
preventing acid generation from pyritic rock. Proceedings of Sud-bury '95: Mining and the Environment, vol. 2. Sudbury, Ontario,
Canada, pp. 495 – 504.
[2]. Bechard, G., Yamazaki, H., Gould, D., Bedard, P., 1994. Use of cellulosic substrates for the microbial treatment of acid mine
drainage. Journal of Environmental Quality 23 (1), 111 – 116.
[3]. Kleinmann, L.L.P., Hedin, R.S., 1993. Treat mine water using passive methods. Pollution Engineering 54 (5), 20 – 22.[4]. Kuyucak, N., 1998. Mining, the environment and the treatment of mine effluents. International Journal of Environment and Pollution
10 (2), 315–325.
[5]. Kuyucak, N., 2001. Acid mine drainage—prevention and control options. Mining Environmental Management Journal, 12 – 15.
(January Issue).